SlideShare a Scribd company logo
Jeff Stokes
Microsoft Field Engineer, GBS
• Thoughts on the IT process and the human impact of same.
The lock down vs the smack down
Why corporate users sometimes resent their IT departments
How the IT Department sees itself
How the IT User Feels
The Case for Controls
• Security
• Audit
• Liability
• WikiLeaks
Security
• Digital Rights Management
• Anti-Virus
• Mobile Device Management
• Email Discovery
• Remote Access Controls
• Patching and Updates
• Desktop Lockdowns/Branding
Audit
• Compliance
• Change Control
• Enforcement
Wikileaks/Breaches
• Public Image/Reputation
• Legal Liability
• Theft of IP/Monetary Assets
The Results of Extreme Controls
• BOYD
• Reduced Productivity
• Lower Morale/Trust Issues
BYOD
• In some ways, BYOD is the loss of respect and faith in the IT
organization by its user base. Users feel they can be productive with
own equipment rather than corporate assets.
• Long Boot Times/Slow Performance
• Frequent Crashes
• Tight System Controls
• In other ways, BYOD is an empowerment of the user to ‘get things
done’. In these cases, the “BYOD” could better be coined “PYOD” (pick
your own device).
Reduced Productivity
• Usage of overly managed systems impede users from getting their
work done.
• Change control and heavy audit processes slow innovation, creativity
and organizational agility.
• Siloing creates team resentment and poor communication channels
Lower Morale/Trust Issues
• What is the cost of to the institution for an employee to walk?
• To go to a competitor?
• For both of these, one must consider the cost of training a replacement, the cost of loss
of institutional knowledge (why was a system setup a certain way 10 years ago?)
• What is the cost to an organization when teams break away and do
their own thing because of operational inefficiencies or overbearing
rules?
What to do?
Control but Trust
• Remember employees, from all divisions and teams, are in it to win it.
• Control lightly, trust heavily.
• Give people the opportunity to do the right thing.
• Trust their judgment, listen before reacting!
Data Protection, not User Restriction
• Use native OS capabilities to protect the ‘good stuff’
• Digital Rights Management appropriately
• Classify Data according to Impact and Importance
• Mobile Device Management for BYOD is Paramount here
• Patch/Secure the end point devices
• Complex Passwords and Security Enforcement that is Reasonable
• Extranet Access, what is needed to do the job, control the floodgate
of information here.
Empower and Enable
• The primary task of IT is to use changing technology to improve
business productivity. Do not lose site of this.
• Give the users good tools to achieve results. Take feedback on what
their view of ‘good tools’ means vs what IT’s view is. Invest in training.
• Remove blockers to employees and teams, make sure they can get
their job done. Remove barriers between orgs. Why reinvent the
wheel?
Adapt and Change
• Create feedback loops in the environment. System monitoring,
alerting for performance, SLA breach, etc. But more importantly,
survey the business heavily. And Listen to the results.
• Be ready to be wrong. Be comfortable to admit mistakes. Nothing
stymie's innovation and action more than fear.
• Readiness and training are paramount. Change with the times, more
so, Innovate with the times.
And more importantly
• Have fun. More time in life is spent working than anything else. Do
what you love. Love what you do.
• Remember, “if nothing ever breaks, IT isn’t innovating to improve
business productivity”
• A system that worked great 10 years ago, does not a great system
today make.
Ad

More Related Content

What's hot (20)

ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
itsm_at_hanover
 
ITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service LifecycleITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service Lifecycle
Multisoft Virtual Academy
 
Itil process framework__rowe(40)
Itil process framework__rowe(40)Itil process framework__rowe(40)
Itil process framework__rowe(40)
Gregory Rowe, LSS, ITIL
 
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processesITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
Richard Grieman
 
Itilv3
Itilv3Itilv3
Itilv3
ahmet durak
 
Itilv3
Itilv3Itilv3
Itilv3
Markus Yaldu
 
ITIL Service Operation 2011
ITIL Service Operation 2011ITIL Service Operation 2011
ITIL Service Operation 2011
Marvin Sirait
 
Presentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentPresentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 Environment
Vyom Labs
 
Functions in Service Operation
Functions in Service OperationFunctions in Service Operation
Functions in Service Operation
nuwulang
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
Axios Systems
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
Wajahat Rajab
 
Service operations
Service operationsService operations
Service operations
trainer_omarali
 
Change Management ITIL
Change Management ITILChange Management ITIL
Change Management ITIL
dkmorgan51
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
jogemwind
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
Jisu Dasgupta
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
Karthik Arumugham
 
7 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.87 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.8
Karthik Arumugham
 
Itil Service Level Mgmnt
Itil Service Level MgmntItil Service Level Mgmnt
Itil Service Level Mgmnt
Sharbani Bhattacharya
 
5 service transition
5 service transition5 service transition
5 service transition
sagaroceanic11
 
ITIL Ayman Hraghi
ITIL Ayman HraghiITIL Ayman Hraghi
ITIL Ayman Hraghi
H'raghi Ayman
 
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processesITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
Richard Grieman
 
ITIL Service Operation 2011
ITIL Service Operation 2011ITIL Service Operation 2011
ITIL Service Operation 2011
Marvin Sirait
 
Presentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 EnvironmentPresentation: Life In An ITIL V3 Environment
Presentation: Life In An ITIL V3 Environment
Vyom Labs
 
Functions in Service Operation
Functions in Service OperationFunctions in Service Operation
Functions in Service Operation
nuwulang
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
Axios Systems
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
Wajahat Rajab
 
Change Management ITIL
Change Management ITILChange Management ITIL
Change Management ITIL
dkmorgan51
 
ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
jogemwind
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
Jisu Dasgupta
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
Karthik Arumugham
 

Similar to Break down the tech mentality of it vs user - Jeff Stokes (20)

What to expect from your IT People
What to expect from your IT PeopleWhat to expect from your IT People
What to expect from your IT People
Jason Caras
 
Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolve
Freshservice
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
Corporacion Colombia Digital
 
2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO
Raffa Learning Community
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOs
Terry White
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
Getting good value from IT
Getting good value from ITGetting good value from IT
Getting good value from IT
Co-Operative Systems
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
SaskSummit
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO
Raffa Learning Community
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ivanti
 
SmartERP PeopleSoft Security
SmartERP PeopleSoft  Security SmartERP PeopleSoft  Security
SmartERP PeopleSoft Security
Smart ERP Solutions, Inc.
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
Femke Goedhart
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
Economic Alliance of Kankakee County
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
Bill Clark
 
2018 2-6 The Changing Role of Today's CIO
2018 2-6 The Changing Role of Today's CIO2018 2-6 The Changing Role of Today's CIO
2018 2-6 The Changing Role of Today's CIO
Raffa Learning Community
 
Santoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptSantoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.ppt
Nir Nia
 
FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015
Blake Coleman
 
CDO_public
CDO_publicCDO_public
CDO_public
Roberto Maranca
 
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
20 Minutes on Desktop Analytics:  Top Uses in the Contact Center 20 Minutes on Desktop Analytics:  Top Uses in the Contact Center
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
Cicero, Inc.
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
Paul McQuillan
 
What to expect from your IT People
What to expect from your IT PeopleWhat to expect from your IT People
What to expect from your IT People
Jason Caras
 
Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolve
Freshservice
 
Ten rules for CIOs
Ten rules for CIOsTen rules for CIOs
Ten rules for CIOs
Terry White
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
SaskSummit
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO
Raffa Learning Community
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ivanti
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
Femke Goedhart
 
IT Governance for Board Members
IT Governance for Board MembersIT Governance for Board Members
IT Governance for Board Members
Bill Clark
 
Santoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptSantoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.ppt
Nir Nia
 
FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015FGP Tech - APPA Conference - September 2015
FGP Tech - APPA Conference - September 2015
Blake Coleman
 
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
20 Minutes on Desktop Analytics:  Top Uses in the Contact Center 20 Minutes on Desktop Analytics:  Top Uses in the Contact Center
20 Minutes on Desktop Analytics: Top Uses in the Contact Center
Cicero, Inc.
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
Paul McQuillan
 
Ad

More from Jeff Stokes (12)

Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Jeff Stokes
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
Jeff Stokes
 
Keynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesKeynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff Stokes
Jeff Stokes
 
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Jeff Stokes
 
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesTmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Jeff Stokes
 
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesTips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Jeff Stokes
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
Advanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesAdvanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff Stokes
Jeff Stokes
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Jeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff Stokes
Jeff Stokes
 
Walking deck
Walking deckWalking deck
Walking deck
Jeff Stokes
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
Jeff Stokes
 
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Jeff Stokes
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
Jeff Stokes
 
Keynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff StokesKeynote talk on Windows 8 - Jeff Stokes
Keynote talk on Windows 8 - Jeff Stokes
Jeff Stokes
 
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Jeff Stokes
 
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff StokesTmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Jeff Stokes
 
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesTips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Jeff Stokes
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
Advanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesAdvanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff Stokes
Jeff Stokes
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Jeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff Stokes
Jeff Stokes
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
Jeff Stokes
 
Ad

Recently uploaded (20)

Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 

Break down the tech mentality of it vs user - Jeff Stokes

  • 1. Jeff Stokes Microsoft Field Engineer, GBS • Thoughts on the IT process and the human impact of same.
  • 2. The lock down vs the smack down Why corporate users sometimes resent their IT departments
  • 3. How the IT Department sees itself
  • 4. How the IT User Feels
  • 5. The Case for Controls • Security • Audit • Liability • WikiLeaks
  • 6. Security • Digital Rights Management • Anti-Virus • Mobile Device Management • Email Discovery • Remote Access Controls • Patching and Updates • Desktop Lockdowns/Branding
  • 7. Audit • Compliance • Change Control • Enforcement
  • 8. Wikileaks/Breaches • Public Image/Reputation • Legal Liability • Theft of IP/Monetary Assets
  • 9. The Results of Extreme Controls • BOYD • Reduced Productivity • Lower Morale/Trust Issues
  • 10. BYOD • In some ways, BYOD is the loss of respect and faith in the IT organization by its user base. Users feel they can be productive with own equipment rather than corporate assets. • Long Boot Times/Slow Performance • Frequent Crashes • Tight System Controls • In other ways, BYOD is an empowerment of the user to ‘get things done’. In these cases, the “BYOD” could better be coined “PYOD” (pick your own device).
  • 11. Reduced Productivity • Usage of overly managed systems impede users from getting their work done. • Change control and heavy audit processes slow innovation, creativity and organizational agility. • Siloing creates team resentment and poor communication channels
  • 12. Lower Morale/Trust Issues • What is the cost of to the institution for an employee to walk? • To go to a competitor? • For both of these, one must consider the cost of training a replacement, the cost of loss of institutional knowledge (why was a system setup a certain way 10 years ago?) • What is the cost to an organization when teams break away and do their own thing because of operational inefficiencies or overbearing rules?
  • 14. Control but Trust • Remember employees, from all divisions and teams, are in it to win it. • Control lightly, trust heavily. • Give people the opportunity to do the right thing. • Trust their judgment, listen before reacting!
  • 15. Data Protection, not User Restriction • Use native OS capabilities to protect the ‘good stuff’ • Digital Rights Management appropriately • Classify Data according to Impact and Importance • Mobile Device Management for BYOD is Paramount here • Patch/Secure the end point devices • Complex Passwords and Security Enforcement that is Reasonable • Extranet Access, what is needed to do the job, control the floodgate of information here.
  • 16. Empower and Enable • The primary task of IT is to use changing technology to improve business productivity. Do not lose site of this. • Give the users good tools to achieve results. Take feedback on what their view of ‘good tools’ means vs what IT’s view is. Invest in training. • Remove blockers to employees and teams, make sure they can get their job done. Remove barriers between orgs. Why reinvent the wheel?
  • 17. Adapt and Change • Create feedback loops in the environment. System monitoring, alerting for performance, SLA breach, etc. But more importantly, survey the business heavily. And Listen to the results. • Be ready to be wrong. Be comfortable to admit mistakes. Nothing stymie's innovation and action more than fear. • Readiness and training are paramount. Change with the times, more so, Innovate with the times.
  • 18. And more importantly • Have fun. More time in life is spent working than anything else. Do what you love. Love what you do. • Remember, “if nothing ever breaks, IT isn’t innovating to improve business productivity” • A system that worked great 10 years ago, does not a great system today make.

Editor's Notes

  • #4: The well meaning IT and Security department tries to protect the user base from malware, spyware, industrial espionage, viruses, worms, software bugs and defective hardware whilst increasing user productivity and managing corporate assets (physical and intellectual property).
  • #5: The IT user is not a child, though often they are treated as such by the departments that manage and provide services to them. Most often users are college educated, mature, professional individuals. Some are quite tech-savvy themselves in fact.
  • #6: Now this dichotomy of IT administrator vs corporate user exists in almost all companies. IT administrators often have the attitude that their users akin to wayward children almost. Now there are reasons for implementing controls and impeding users from achieving some tasks without checks and balances. These can generally be broken down into Security, need for internal and external Audit, and preventing the corporate assets and communications from ending up on Wikileaks.